Managed File Transfer
|
|
|
- Kerry McCarthy
- 10 years ago
- Views:
Transcription
1 Managed File Transfer In many organizations a large part of the exchange and distribution of information is realized by the copy and transfer of data files. As the number of files is ever increasing, the results are serious management and security issues. These issues are predominantly operational, so awareness at management level is typically low. Consider the following use cases. For years, corporations have been moving from bespoke to standard software: traditional locally installed packages or cloud delivered SAAS packages. Generally, standard software does not allow access to data directly but instead provides an application layer interface. For bulk transfers, the service / message style interfaces perform poorly, so file-based interfaces are common for these kinds of transfers. Files often contain the right information in the wrong format. Rather than script file changes and build an unmanageable library of scripts there is a need for a Managed File Transfer (MFT) product. Recent trends lead to more data being stored in files: - Hadoop s HDFS provides scalable, sheer unlimited capacity to store any files. Partly due to the limitations to update files history is often stored in completely separate files. - More and more applications generate or use rich content like media (photos, videos) which is also commonly stored. Corporations often use workplace software like SharePoint to formalize desktop processes and information. To link these processes to transactional systems there is a requirement to integrate these systems with workplace & office files, and with that the need for MFT. A SharePoint frontend on a transactional system also eliminates all kinds of unwanted direct access to business applications. Challenges FTP is a commonly used file transfer protocol but it offers no guarantees in delivery of files. To ensure delivery additional scripting is needed. As a result, every file transfer needs its own script, the number of scripts explodes and the environment becomes unmanageable. Creating a script is easy, maintaining and operating it is not. To address those issues, organizations sometimes deploy a file exchange platform to manage these scripts. Due to the nature of scripting, this platform (often not more than a server with storage and lots of scripting) soon becomes a management nightmare itself. Most of the scripting is not documented, it is often unknown what exactly is happening and no real management is possible. Whenever there is an interruption, fixing scripts involves reverse engineering, long downtimes and even hacking. When file transfer to customers or partners and with that external transfers become necessary, the file exchange platform is often duplicated to the DMZ. Now there is not only a management problem, but also a security risk. The end result is a deadly combination of high costs and high risks. Managed file transfer HVR Software, December 2014 Page 1
2 HVR for MFT HVR provides Managed File Transfer functionality. This can be used as a tool in its own right, but also as part of the integrated HVR suite for enterprise data integration. Complex file transfer chains can be configured, scheduled and controlled from a central point on an enterprise-wide level. HVR supports 3 types of file transfer: file-to-file, database-to-file and file-to-database. File-to-file transfer An HVR file-to-file transfer will copy the files from one file location (the source location) to one or more other file locations (the target locations). A file location is a directory or a tree of directories, which can either be accessed through the local file system (Unix, Linux or Windows) or through a network file protocol (FTP, FTPs, sftp or WebDAV). Files can be copied or moved. In the latter case, the files on the source location are deleted after they have been copied to the target locations. The file contents are normally preserved, but it is possible to include file transformations in the copy process using external commands or definitions defined in an XSLT file. To distribute sets of files HVR provides the possibility to copy files selectively from the source location by matching their names to a predefined pattern. This feature also enables the routing of files within the same source location to different target locations on the basis of their file names to enable selective file distribution scenarios. File-to-database transfer In a file-to-database transfer data will be read from files in the source file location and replicated into one or more target databases. The source files are by default expected to be in a specific HVR XML format, which contains the table information required to determine to which tables and rows the changes should be written in the target database. It is also possible to use other input file formats by including an additional transformation step in the file capture. Support for CSV is available out-of-the-box, but any format can be handled by providing an external command or an XSLT definition. Database-to-file transfer In a database-to-file transfer the data is read from a source database and copied into one or more files on the source file location. By default the resulting files are in the HVR XML format preserving the table information. However, CSV is also supported out-of-the-box and other file formats can be created by including an additional transformation command or XSLT definition in the file output. As in the Continuous Database Replication between databases, it is possible to select specific tables and rows form the source database and convert names and column values. Managed file transfer HVR Software, December 2014 Page 2
3 Advanced scenarios HVR s flexible architecture and seamless file integration make a combination of various scenarios also possible. For example combining distribution and conversion into a database distribution & file conversion channel. HVR s flexible architecture enables interchanging all kinds of scenarios easily! HVR Managed File Transfer shares underlying data transport architecture with database refresh and replication, taking advantage of common features such as continuous data streaming, data compression and network encryption. As a result HVR MFT is optimized for maximum performance, efficiency and scalability making very effective use of network resources. It can easily handle multi-gigabyte files sent in a single task to or from 100 or more locations. Supported sources Supported targets Oracle, all editions, including Amazon RDS All supported sources SQL Server, all editions, including Azure Teradata DB2 on Linux, Unix and Windows Actian Vector (Vectorwise) Ingres Actian Matrix (ParAccel) Flat files Pivotal Greenplum SharePoint Pivotal Hawq ftp locations Amazon Redshift Hadoop (hdfs) HVR s MFT capabilities Setting up HVR is done from HVR s easy to use GUI. The GUI exposes all options to the user in easy dialogs. The GUI also shows the commands needed to perform the same actions on the command line for scripting as well. Finally, the GUI is directly linked to HVR s help system through context-sensitive help. The first step is to define physical locations for files. These locations can be local or remote. Local locations are just locations on your file system (a directory). Remote locations exists in 2 flavors: connecting to a remote HVR agent accessing its file system or connect through an external protocol. The former uses HVR s built in protocol, ensuring optimal performance and reliability Managed file transfer HVR Software, December 2014 Page 3
4 Figure 1 Setting up a remote file location However, in certain cases, only external protocols are available. HVR allows you to connect through webdav or (s)ftp(s). You ll have to provide the credentials and set the necessary options (encryption, port, etc.). The advantage of using these protocols with HVR rather than in scripting is the monitoring and managing capabilities HVR adds. The next step is setting up a transfer, in HVR terms a Channel. A channel can contain various types of locations (database or file). In the case of MFT, there are file locations involved. If there is no data structure in the channel definition (e.g. a table layout) then HVR handles files as BLOBs. BLOBs can be of any format and transported anywhere, but they cannot be transformed. If the user adds structure to a channel by defining table structures then HVR treats files as containing this structure (in XML or CSV format). In this case HVR can manipulate the data in the files. Figure 2 Defining table structure defines file structure as well Should you wish to handle structured and unstructured data together, you can create 2 separate channels sharing the locations, one with table structures defined, one without. Managed file transfer HVR Software, December 2014 Page 4
5 In order to define what has to be done in a channel, you have to define Actions in the channel. Every channel needs an action for the source and an action for the target: the FileCapture and FileIntegrate respectively. Defining Location behavior The Action FileCapture is used to instruct HVR to capture files from a file location and to control its behavior. Figure 3 Action FileCapture Defining the action is sufficient to start replication. You can however taylor it to your needs by setting options. Use the /DeleteAfterCapture option to move files instead of copying them. The /Pattern and /IgnorePattern options control what files are picked up and ignored by HVR. For example, pickup all files called *.xml and ignore all files with tmp in it (*tmp*). More powerful expressions are possible. There are multiple ways to control the handshake between the process that creates the file and HVR picking it up. Ideally the creation of a file is an atomic process, e.g. by moving it to the capture location when the file is complete. Alternatively, the /IngoreUnterminated option can be used for HVR to wait until a termination expression is written to a file (e.g. EOF). /AccessDelay forces HVR to wait for a certain amount of time before processing a file. This can be used when writing the file is guaranteed to finish in a certain amount of time. The /UseDirectoryTime option can be used in conjunction with touching the directory date when done writing. For the target file locations, the FileIntegrate action has to be set: Figure 4 Action FileIntegrate Again, setting it is enough to commence transfer of files. However, several options can be controlled. Managed file transfer HVR Software, December 2014 Page 5
6 /ErrorOnOverwrite controls whether overwrites are allowed or not. Overwrites would normally only happen when the source file is being altered and HVR has to retransfer it. The parameter /RenameExpression allows the user to perform rename operations with regular expressions. You can also add variables like a timestamp to filenames (which can be used to prevent overwrites from happening). /MaxFileSize will split files accordingly, it is normally only used on structured files containing data. /Journal enables journaling, /HVROpField adds an operation field, enabling deletes to be written as well. This is usefull in database / file combinations. /ConvertNewLines controls Dos/Unix newline conversion and /OnErrorSaveFailed will save the error induced files to a different location, making the transfer more resilient by not aborting it. HVR s advanced options When more is needed than a 1-1 file transfer, HVR s advanced actions are to be called in. To transform files, the action Transform is available within HVR. Figure 5 Action Transform In this action, it is possible to add transformations. HVR supports a number of different transformation mechanisms. HVR has some transformations buit-in like: Softdeletes (transforming a deletion indication to items representing a a delete XML <=> CSV Tokenize (call an external token service to encrypt a value) Fike2Column (load a file into a database column) On top of that HVR allows you to add an XSLT style sheet performing the transformation and finally allows you to write you own conversion script and control it from HVR. This also allows you to interface with another application directly. A popular use case for external transformations is the use of HVR in conjunction with an ETL tool. For these scenarios it often makes sense to use the /HVROpField parameter in conjunction with the Command option in antransformation action. Using multiple transformation actions is also possible. You can define the Transform action multiple times and can control their sequence with the /order option. Managed file transfer HVR Software, December 2014 Page 6
7 For advanced option on capture and integrate location, an action LocationProperties can be used in conjunction with FileCapture and/or FileIntegrate Figure 6 Defining LocationProperties It enables you to encrypt the connection to the location (/SslCertificate), connect through a proxy (/Proxy) and throttle the used bandwidth (/ThrottleKbytes and /ThrottleMillisecs). For read only locations, the creation of temporary files is impossible. However, HVR normally creates a subdirectory State for all locations into or out of which HVR writes or reads. This location can be overridden in the action LocationProperties with the /StateDirectory parameter. Managed file transfer HVR Software, December 2014 Page 7
How to Implement Multi-way Active/Active Replication SIMPLY
How to Implement Multi-way Active/Active Replication SIMPLY The easiest way to ensure data is always up to date in a 24x7 environment is to use a single global database. This approach works well if your
Real-time High Volume Data Replication White Paper
Real-time High Volume Data Replication White Paper Version 2.4 Table of Contents 1 HVR overview... 3 1.1 HVR Usage Scenarios... 4 1.2 Product Overview... 7 2 Technology... 9 2.1 Architecture and Key Capabilities...
IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015. Integration Guide IBM
IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015 Integration Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 93.
IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM
IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016 Integration Guide IBM Note Before using this information and the product it supports, read the information
Deploy. Friction-free self-service BI solutions for everyone Scalable analytics on a modern architecture
Friction-free self-service BI solutions for everyone Scalable analytics on a modern architecture Apps and data source extensions with APIs Future white label, embed or integrate Power BI Deploy Intelligent
Sisense. Product Highlights. www.sisense.com
Sisense Product Highlights Introduction Sisense is a business intelligence solution that simplifies analytics for complex data by offering an end-to-end platform that lets users easily prepare and analyze
WhiteWave's Integrated Managed File Transfer (MFT)
WhiteWave's Integrated Managed File Transfer (MFT) Spotlight on webmethods ActiveTransfer Scott Jaynes ecommerce Architect, WhiteWave Foods Ramesh Venkat Director, Product Management, Software AG 10/17/12
New Features in Neuron ESB 2.6
New Features in Neuron ESB 2.6 This release significantly extends the Neuron ESB platform by introducing new capabilities that will allow businesses to more easily scale, develop, connect and operationally
DiskPulse DISK CHANGE MONITOR
DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com [email protected] 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product
Bootstrap guide for the File Station
Bootstrap guide for the File Station Introduction Through the File Server it is possible to store files and create automated backups on a reliable, redundant storage system. NOTE: this guide considers
Data processing goes big
Test report: Integration Big Data Edition Data processing goes big Dr. Götz Güttich Integration is a powerful set of tools to access, transform, move and synchronize data. With more than 450 connectors,
Using RD Gateway with Azure Multifactor Authentication
Using RD Gateway with Azure Multifactor Authentication We have a client that uses RD Gateway to allow users to access their RDS deployment from outside their corporate network. They have about 1000+ users.
How To Load Data Into An Org Database Cloud Service - Multitenant Edition
An Oracle White Paper June 2014 Data Movement and the Oracle Database Cloud Service Multitenant Edition 1 Table of Contents Introduction to data loading... 3 Data loading options... 4 Application Express...
Architecture and Mode of Operation
Software- und Organisations-Service Open Source Scheduler Architecture and Mode of Operation Software- und Organisations-Service GmbH www.sos-berlin.com Scheduler worldwide Open Source Users and Commercial
Data Security and Governance with Enterprise Enabler
Copyright 2014 Stone Bond Technologies, L.P. All rights reserved. The information contained in this document represents the current view of Stone Bond Technologies on the issue discussed as of the date
Assignment # 1 (Cloud Computing Security)
Assignment # 1 (Cloud Computing Security) Group Members: Abdullah Abid Zeeshan Qaiser M. Umar Hayat Table of Contents Windows Azure Introduction... 4 Windows Azure Services... 4 1. Compute... 4 a) Virtual
Actian Analytics Platform Express Hadoop SQL Edition 2.0
Actian Analytics Platform Express Hadoop SQL Edition 2.0 Tutorial AH-2-TU-05 This Documentation is for the end user's informational purposes only and may be subject to change or withdrawal by Actian Corporation
Mobile Admin Architecture
Mobile Admin Architecture Introduction Mobile Admin is an enterprise-ready IT Management solution that enables system administrators to monitor and manage their corporate IT infrastructure from a mobile
Cloudera Backup and Disaster Recovery
Cloudera Backup and Disaster Recovery Important Note: Cloudera Manager 4 and CDH 4 have reached End of Maintenance (EOM) on August 9, 2015. Cloudera will not support or provide patches for any of the Cloudera
Enhanced Connector Applications SupportPac VP01 for IBM WebSphere Business Events 3.0.0
Enhanced Connector Applications SupportPac VP01 for IBM WebSphere Business Events 3.0.0 Third edition (May 2012). Copyright International Business Machines Corporation 2012. US Government Users Restricted
SOSFTP Managed File Transfer
Open Source File Transfer SOSFTP Managed File Transfer http://sosftp.sourceforge.net Table of Contents n Introduction to Managed File Transfer n Gaps n Solutions n Architecture and Components n SOSFTP
Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications
Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications White Paper Table of Contents Overview...3 Replication Types Supported...3 Set-up &
Introduction. KLS Backup 2011. Program Overview
Introduction Program Overview is a powerful backup, synchronization and disk cleaner program that allows you to back up or synchronize your data to local and network drives, cloud storage, CD/DVD disc,
CASHNet Secure File Transfer Instructions
CASHNet Secure File Transfer Instructions Copyright 2009, 2010 Higher One Payments, Inc. CASHNet, CASHNet Business Office, CASHNet Commerce Center, CASHNet SMARTPAY and all related logos and designs are
Centralized Disaster Recovery using RDS
Centralized Disaster Recovery using RDS RDS is a cross-platform, scheduled replication application. Using RDS s replication and scheduling capabilities, a Centralized Disaster Recovery model may be used
How To Use Attix5 Pro For A Fraction Of The Cost Of A Backup
Service Overview Business Cloud Backup Techgate s Business Cloud Backup service is a secure, fully automated set and forget solution, powered by Attix5, and is ideal for organisations with limited in-house
Background on Elastic Compute Cloud (EC2) AMI s to choose from including servers hosted on different Linux distros
David Moses January 2014 Paper on Cloud Computing I Background on Tools and Technologies in Amazon Web Services (AWS) In this paper I will highlight the technologies from the AWS cloud which enable you
Qlik Sense Enabling the New Enterprise
Technical Brief Qlik Sense Enabling the New Enterprise Generations of Business Intelligence The evolution of the BI market can be described as a series of disruptions. Each change occurred when a technology
Managed File Transfer with Universal File Mover
Managed File Transfer with Universal File Mover Roger Lacroix [email protected] http://www.capitalware.com Universal File Mover Overview Universal File Mover (UFM) allows the user to combine
Powerful Management of Financial Big Data
Powerful Management of Financial Big Data TickSmith s solutions are the first to apply the processing power, speed, and capacity of cutting-edge Big Data technology to financial data. We combine open source
Course 20533: Implementing Microsoft Azure Infrastructure Solutions
Course 20533: Implementing Microsoft Azure Infrastructure Solutions Overview About this course This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.
Herve Roggero 3/3/2015
BLUE SYNTAX CONSULTING Enzo Cloud Backup Overview Herve Roggero 3/3/2015 Contents General Technical Overview... 3 Operation Modes... 3 Enzo Agent... 4 Running Multiple Enzo Agents... 4 How to deploy...
AWS Schema Conversion Tool. User Guide Version 1.0
AWS Schema Conversion Tool User Guide AWS Schema Conversion Tool: User Guide Copyright 2016 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may
Managed File Transfer
Managed File Transfer How do most organizations move files today? FTP Typically File Transfer Protocol (FTP) is combined with writing and maintaining homegrown code to address its limitations Limited Reliability
KEMP LoadMaster. Enabling Hybrid Cloud Solutions in Microsoft Azure
KEMP LoadMaster Enabling Hybrid Cloud Solutions in Microsoft Azure Introduction An increasing number of organizations are moving from traditional on-premises datacenter architecture to a public cloud platform
WinSCP for Windows: Using SFTP to upload files to a server
WinSCP for Windows: Using SFTP to upload files to a server Quickstart guide Developed by: Academic Technology Services & User Support, CIT atc.cit.cornell.edu Last updated 9/9/08 WinSCP 4.1.6 Getting started
Please note that a username and password will be made available upon request. These are necessary to transfer files.
Transferring Data Using Secure File Transfer Process ASU Center for Health Information and Research (CHiR) data partners can now securely electronically send their data submissions by means of Secure File
DMZ Gateways: Secret Weapons for Data Security
A L I N O M A S O F T W A R E W H I T E P A P E R DMZ Gateways: Secret Weapons for Data Security A L I N O M A S O F T W A R E W H I T E P A P E R DMZ Gateways: Secret Weapons for Data Security EXECUTIVE
SECURE YOUR DATA EXCHANGE WITH SAFE-T BOX
SECURE YOUR DATA EXCHANGE SAFE-T BOX WHITE PAPER Safe-T. Smart Security Made Simple. 1 The Costs of Uncontrolled Data Exchange 2 Safe-T Box Secure Data Exchange Platform 2.1 Business Applications and Data
User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011
User's Guide Product Version: 2.5.0 Publication Date: 7/25/2011 Copyright 2009-2011, LINOMA SOFTWARE LINOMA SOFTWARE is a division of LINOMA GROUP, Inc. Contents GoAnywhere Services Welcome 6 Getting Started
ibolt V3.2 Release Notes
ibolt V3.2 Release Notes Welcome to ibolt V3.2, which has been designed to deliver an easy-touse, flexible, and cost-effective business integration solution. This document highlights the new and enhanced
SQUEEZE SERVER. Operation Guide Version 3.0
SQUEEZE SERVER Operation Guide Version 3.0 CONTENTS Introduction to Squeeze Server... 1 Features... 2 Squeeze Server Components... 3 How Squeeze Server Works... 4 Running Squeeze Server... 5 Priority Job
Cloudera Backup and Disaster Recovery
Cloudera Backup and Disaster Recovery Important Notice (c) 2010-2013 Cloudera, Inc. All rights reserved. Cloudera, the Cloudera logo, Cloudera Impala, and any other product or service names or slogans
Implementing Microsoft Azure Infrastructure Solutions
Course Code: M20533 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Implementing Microsoft Azure Infrastructure Solutions Overview This course is aimed at experienced IT Professionals who currently
Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led
Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led Course Description This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.
Dynamics CRM 2011. with Azure and SharePoint a perfect match. Central and Eastern Europe
Central and Eastern Europe Dynamics CRM 2011 with Azure and SharePoint a perfect match Almut Tadsen Dynamics ISV Developer Evangelist [email protected] Agenda for today Azure Execute your out of CRM
Course 20533B: Implementing Microsoft Azure Infrastructure Solutions
Course 20533B: Implementing Microsoft Azure Infrastructure Solutions Sales 406/256-5700 Support 406/252-4959 Fax 406/256-0201 Evergreen Center North 1501 14 th St West, Suite 201 Billings, MT 59102 Course
AvePoint DocAve Online vs Office 365 - SharePoint Online Management
AvePoint DocAve Online vs Office 365 - Management Overview: DocAve Online is a multi-tenant Software as a Service (SaaS) offering from AvePoint, hosted on Microsoft s Azure Platform as a Service (PaaS)
Viking VPN Guide Linux/UNIX
Viking VPN Guide Linux/UNIX Table Of Contents 1 : VPN Questions answered 2 : Installing the Linux Client 3 : Connecting with the Linux Client 4 : Reporting Problems Version 1.0 : 10/27/2010 Information
Introducing the Reimagined Power BI Platform. Jen Underwood, Microsoft
Introducing the Reimagined Power BI Platform Jen Underwood, Microsoft Thank You Sponsors Empower users with new insights through familiar tools while balancing the need for IT to monitor and manage user
Moxa Device Manager 2.3 User s Manual
User s Manual Third Edition, March 2011 www.moxa.com/product 2011 Moxa Inc. All rights reserved. User s Manual The software described in this manual is furnished under a license agreement and may be used
Harnessing the Power of the Microsoft Cloud for Deep Data Analytics
1 Harnessing the Power of the Microsoft Cloud for Deep Data Analytics Today's Focus How you can operate your business more efficiently and effectively by tapping into Cloud based data analytics solutions
FAQ. Hosted Data Disaster Protection
Hosted Data Disaster Protection Flexiion is based in the UK and delivers Infrastructure as a Service (IaaS) solutions, making the advantages of the Cloud and IaaS more accessible to mid-size, professional
Gladinet Cloud Backup V3.0 User Guide
Gladinet Cloud Backup V3.0 User Guide Foreword The Gladinet User Guide gives step-by-step instructions for end users. Revision History Gladinet User Guide Date Description Version 8/20/2010 Draft Gladinet
Skybot Scheduler Release Notes
Skybot Scheduler Release Notes The following is a list of new features and enhancements included in each release of Skybot Scheduler. Skybot Scheduler 3.3 Oracle interface The new Skybot Scheduler Oracle
EVault for Data Protection Manager. Course 361 Protecting Linux and UNIX with EVault
EVault for Data Protection Manager Course 361 Protecting Linux and UNIX with EVault Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab...
Backup Exec Private Cloud Services. Planning and Deployment Guide
Backup Exec Private Cloud Services Planning and Deployment Guide Chapter 1 Introducing Backup Exec Private Cloud Services This chapter includes the following topics: About Backup Exec Private Cloud Services
QLIKVIEW AND THE CLOUD
QLIKVIEW AND THE CLOUD A QlikView Technology White Paper July 2012 qlikview.com Table of Contents Overview 4 Who Is This Paper For? 4 Cloud Terminology and QlikView 5 Software as a Service - SaaS 6 QlikView
Two new DB2 Web Query options expand Microsoft integration As printed in the September 2009 edition of the IBM Systems Magazine
Answering the Call Two new DB2 Web Query options expand Microsoft integration As printed in the September 2009 edition of the IBM Systems Magazine Written by Robert Andrews [email protected] End-user
AvePoint DocAve Online vs Office 365 - SharePoint Online Management
AvePoint DocAve Online vs Management Overview: DocAve Online is a multi-tenant Software as a Service (SaaS) offering from AvePoint, hosted on Microsoft s Azure Platform as a Service (PaaS) technology.
DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services
DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services Table of Contents Table of Contents Using the BIG-IP Edge Gateway for layered security and
openft Enterprise File Transfer Copyright 2011 FUJITSU
openft Enterprise File Transfer Introduction 1 Enterprise File Transfer openft Ready to Transfer your Business Critical Data 2 openft in a nutshell openft is a high-performance solution for enterprise-wide
THE WINDOWS AZURE PROGRAMMING MODEL
THE WINDOWS AZURE PROGRAMMING MODEL DAVID CHAPPELL OCTOBER 2010 SPONSORED BY MICROSOFT CORPORATION CONTENTS Why Create a New Programming Model?... 3 The Three Rules of the Windows Azure Programming Model...
DocAve 6 High Availability
DocAve 6 High Availability User Guide Service Pack 6 Issued October 2015 1 Table of Contents What s New in This Guide... 6 About DocAve High Availability... 7 Submitting Documentation Feedback to AvePoint...
fåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé
fåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé Internet Server FileXpress Internet Server Administrator s Guide Version 7.2.1 Version 7.2.2 Created on 29 May, 2014 2014 Attachmate Corporation and its licensors.
IM and Presence Disaster Recovery System
Disaster Recovery System, page 1 Access the Disaster Recovery System, page 2 Back up data in the Disaster Recovery System, page 3 Restore scenarios, page 9 Backup and restore history, page 15 Data authentication
Access Database Hosting. An introduction to Cloud Hosting Access databases from Your Office Anywhere
Access Database Hosting An introduction to Cloud Hosting Access databases from Your Office Anywhere Microsoft Access is a powerful way of creating bespoke database applications for either your own business
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) A RSACCESS WHITE PAPER 1 Microsoft Forefront Unified Access Gateway Overview 2 Safe-T RSAccess Secure Front-end Overview
SOLUTIONS INC. BACK-IT UP. Online Backup Solution
SOLUTIONS INC. Online Backup Solution Data loss is a nightmare Your data is growing exponentially 1MB of data is worth US$10,000 If you find yourself now in a situation where you have to deal with an explosion
Deploying BitDefender Client Security and BitDefender Windows Server Solutions
Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2010 BitDefender; 1. Installation Overview Thank you for selecting BitDefender Business Solutions
Installation and Setup: Setup Wizard Account Information
Installation and Setup: Setup Wizard Account Information Once the My Secure Backup software has been installed on the end-user machine, the first step in the installation wizard is to configure their account
CA ARCserve Backup for Windows
CA ARCserve Backup for Windows Agent for Microsoft SharePoint Server Guide r15 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for
Simple Solution. Brighter Futures. TSDS Technical Course Module 3: Loading Data Using the DTU
Simple Solution. Brighter Futures. TSDS Technical Course Module 3: Loading Data Using the DTU Click Course to Menu edit Master title style 2 Process Map Overview File Preparation DTU Overview DTU On Demand
Laptop Backup - Administrator Guide (Windows)
Laptop Backup - Administrator Guide (Windows) Page 1 of 86 Page 2 of 86 Laptop Backup - Administrator Guide (Windows) TABLE OF CONTENTS OVERVIEW PREPARE COMMCELL SETUP FIREWALL USING PROXY SETUP FIREWALL
GlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
Improving Your Relationship with SAS Enterprise Guide
Paper BI06-2013 Improving Your Relationship with SAS Enterprise Guide Jennifer Bjurstrom, SAS Institute Inc. ABSTRACT SAS Enterprise Guide has proven to be a very beneficial tool for both novice and experienced
Big data variety, 179 velocity, 179 volume, 179 Blob storage containers
Index A AADRM. See Azure active directory rights management (AADRM) AADRM PowerShell module Azure AD module, 164 Connect-AadrmService cmdlet, 164 Connect-MsolService cmdlet, 164 PowerShell v2.0 and.net
New Features... 1 Installation... 3 Upgrade Changes... 3 Fixed Limitations... 4 Known Limitations... 5 Informatica Global Customer Support...
Informatica Corporation B2B Data Exchange Version 9.5.0 Release Notes June 2012 Copyright (c) 2006-2012 Informatica Corporation. All rights reserved. Contents New Features... 1 Installation... 3 Upgrade
SharePoint Integration Framework Developers Cookbook
Sitecore CMS 6.3 to 6.6 and SIP 3.2 SharePoint Integration Framework Developers Cookbook Rev: 2013-11-28 Sitecore CMS 6.3 to 6.6 and SIP 3.2 SharePoint Integration Framework Developers Cookbook A Guide
Oracle Managed File Getting Started - Transfer FTP Server to File Table of Contents
Oracle Managed File Getting Started - Transfer FTP Server to File Table of Contents Goals... 3 High- Level Steps... 4 Basic FTP to File with Compression... 4 Steps in Detail... 4 MFT Console: Login and
Jeremy Kashel Tim Kent Martyn Bullerwell. Chapter No.2 "Master Data Services Overview"
Jeremy Kashel Tim Kent Martyn Bullerwell Chapter No.2 "Master Data Services Overview" Master Data Services Overview In this chapter, we will provide an overview of SQL Server 2008 R2 Master Data Services
kalmstrom.com Business Solutions
HelpDesk OSP User Manual Content 1 INTRODUCTION... 3 2 REQUIREMENTS... 4 3 THE SHAREPOINT SITE... 4 4 THE HELPDESK OSP TICKET... 5 5 INSTALLATION OF HELPDESK OSP... 7 5.1 INTRODUCTION... 7 5.2 PROCESS...
Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
White Paper Secure Reverse Proxy Server and Web Application Firewall
White Paper Secure Reverse Proxy Server and Web Application Firewall 2 Contents 3 3 4 4 8 Losing control Online accessibility means vulnerability Regain control with a central access point Strategic security
Hyperoo 2 User Guide. Hyperoo 2 User Guide
1 Hyperoo 2 User Guide 1 2 Contents How Hyperoo Works... 3 Installing Hyperoo... 3 Hyperoo 2 Management Console... 4 The Hyperoo 2 Server... 5 Creating a Backup Array... 5 Array Security... 7 Previous
Technical White Paper. Automating the Generation and Secure Distribution of Excel Reports
Technical White Paper Automating the Generation and Secure Distribution of Excel Reports Table of Contents Introduction...3 Creating Spreadsheet Reports: A Cumbersome and Manual Process...3 Distributing
IBM Unica emessage Version 8 Release 6 February 13, 2015. Startup and Administrator's Guide
IBM Unica emessage Version 8 Release 6 February 13, 2015 Startup and Administrator's Guide Note Before using this information and the product it supports, read the information in Notices on page 83. This
User's Guide. ControlPoint. Change Manager (Advanced Copy) SharePoint Migration. v. 4.0
User's Guide ControlPoint Change Manager (Advanced Copy) SharePoint Migration v. 4.0 Last Updated 7 August 2013 i Contents Preface 3 What's New in Version 4.0... 3 Components... 3 The ControlPoint Central
Best Practices for Trialing the Intronis Cloud Backup and Recovery Solution
Best Practices for Trialing the Intronis Cloud Backup and Recovery Solution Intronis Cloud Backup and Recovery is a file based backup application that allows users to back up their critical data to the
Deploy Remote Desktop Gateway on the AWS Cloud
Deploy Remote Desktop Gateway on the AWS Cloud Mike Pfeiffer April 2014 Last updated: May 2015 (revisions) Table of Contents Abstract... 3 Before You Get Started... 3 Three Ways to Use this Guide... 4
Interwise Connect. Working with Reverse Proxy Version 7.x
Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web
Security Development Tool for Microsoft Dynamics AX 2012 WHITEPAPER
Security Development Tool for Microsoft Dynamics AX 2012 WHITEPAPER Junction Solutions documentation 2012 All material contained in this documentation is proprietary and confidential to Junction Solutions,
CA XCOM Data Transport Gateway
CA XCOM Data Transport Gateway Release Notes Release 11.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
RDS Migration Tool Customer FAQ Updated 7/23/2015
RDS Migration Tool Customer FAQ Updated 7/23/2015 Amazon Web Services is now offering the Amazon RDS Migration Tool a powerful utility for migrating data with minimal downtime from on-premise and EC2-based
Alfresco Enterprise on AWS: Reference Architecture
Alfresco Enterprise on AWS: Reference Architecture October 2013 (Please consult http://aws.amazon.com/whitepapers/ for the latest version of this paper) Page 1 of 13 Abstract Amazon Web Services (AWS)
In This Guide. Nitro Pro 9 - Deployment Guide
In This Guide Nitro Pro 9 Deployment Guide 3 Customize Your Installation 3 To Customize An Installation Using The Wizard 3 Syntax Example 3 To Customize An Installation Using Orca 4 Syntax Example 4 Customizable
Configuring Apache HTTP Server as a Reverse Proxy Server for SAS 9.3 Web Applications Deployed on Oracle WebLogic Server
Configuration Guide Configuring Apache HTTP Server as a Reverse Proxy Server for SAS 9.3 Web Applications Deployed on Oracle WebLogic Server This document describes how to configure Apache HTTP Server
owncloud Architecture Overview
owncloud Architecture Overview owncloud, Inc. 57 Bedford Street, Suite 102 Lexington, MA 02420 United States phone: +1 (877) 394-2030 www.owncloud.com/contact owncloud GmbH Schloßäckerstraße 26a 90443
Requirement Priority Name Requirement Text Response Comment
N-Tiered Architecture Accessibility Application architecture shall consist of a minimum of four tiers: proxy, presentation, application, and data [base]. Each of the fours tiers shall be separated with
